CVE-2020-26542
📋 TL;DR
This vulnerability allows authentication bypass in MongoDB Simple LDAP plugin for Percona Server when using SimpleLDAP authentication with Microsoft Active Directory. Attackers can authenticate with blank passwords, gaining access at the level of the authenticating account. Affects systems using Percona Server with Simple LDAP plugin and Active Directory integration.
💻 Affected Systems
- Percona Server with MongoDB Simple LDAP plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full Active Directory domain compromise if high-privilege service accounts are vulnerable, leading to data exfiltration, lateral movement, and complete system takeover.
Likely Case
Unauthorized database access leading to data theft, modification, or deletion, potentially escalating to broader network access.
If Mitigated
Limited impact if proper network segmentation, least privilege, and monitoring are in place, though authentication bypass still occurs.
🎯 Exploit Status
Exploitation requires no authentication and minimal technical skill - simply sending blank password triggers the bypass.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Percona Distribution for MySQL PXC variant 8.0.20 and later updates
Restart Required: Yes
Instructions:
1. Update to Percona Distribution for MySQL PXC variant 8.0.20 or later. 2. Apply patches from Percona advisory. 3. Restart Percona Server services. 4. Verify authentication now rejects blank passwords.
🔧 Temporary Workarounds
Disable SimpleLDAP Authentication
allTemporarily disable SimpleLDAP authentication until patching is complete
Modify Percona Server configuration to use alternative authentication methods
Comment out or remove SimpleLDAP configuration lines
Implement Network Controls
allRestrict access to Percona Server to only trusted networks and systems
Configure firewall rules to limit Percona Server port access
Implement network segmentation
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable systems
- Enable detailed authentication logging and monitor for blank password attempts
🔍 How to Verify
Check if Vulnerable:
Test authentication with blank password against SimpleLDAP configuration; if successful, system is vulnerable.
Check Version:
mysql --version or check Percona Server version in configuration/management interface
Verify Fix Applied:
Attempt authentication with blank password; should be rejected after patch.
📡 Detection & Monitoring
Log Indicators:
- Authentication attempts with blank/empty passwords in Percona Server logs
- Successful logins from unexpected sources
Network Indicators:
- Authentication traffic to Percona Server with minimal payload size
- Unusual database access patterns
SIEM Query:
source="percona_logs" AND (password="" OR auth_failure="blank_password")
🔗 References
- https://jira.percona.com/browse/PS-7358
- https://jira.percona.com/browse/PSMDB-726
- https://www.percona.com/blog/2020/10/13/percona-distribution-for-mysql-pxc-variant-8-0-20-fixes-for-security-vulnerability-release-roundup-october-13-2020/
- https://www.percona.com/doc/percona-distribution-mysql/8.0/release-notes-pxc-v8.0.20.upd2.html
- https://jira.percona.com/browse/PS-7358
- https://jira.percona.com/browse/PSMDB-726
- https://www.percona.com/blog/2020/10/13/percona-distribution-for-mysql-pxc-variant-8-0-20-fixes-for-security-vulnerability-release-roundup-october-13-2020/
- https://www.percona.com/doc/percona-distribution-mysql/8.0/release-notes-pxc-v8.0.20.upd2.html